"A Man Of Many Perversions" – Federal Cybersecurity Head Convicted Of Child Porn Charges

Tyler Durden's picture

Submitted by Mike Krieger of Liberty Blitzkrieg blog,

The following story is a warning as to why centralized power is so dangerous. It doesn’t matter whether the power is political or corporate, overly centralized power in all forms must be resisted whenever it appears. The worst of all worlds is when centralized political and corporate power unite in an unholy alliance, which is what has happened to America in recent decades. When this occurs, the combined forces of oligarchy simply begin to rapaciously feast on the citizenry with zero accountability. This is a fair description of the United States in 2014.

The primary problem with centralized power is that sociopaths (for obvious reasons) gravitate toward, and greatly covet, positions of power. Once entrenched in such positions, they are able to act upon their perversions with general immunity, and if they are caught, are often left in positions of power by others who at that point “own them” via blackmail. This of course is nothing new, it is how the game of power, politics and economics has been played since the beginning of time. It is also why decentralization of power is the natural evolution we as a species must embrace in order to build a better world.

Enter Timothy DeFoggi, the one-time cybersecurity director of the U.S. Department of Health and Human Services, who received several awards for his government “service” over the years. The self-proclaimed man of “many perversions,” frequented a child porn site called PedoBook where he “exchanged private messages with other members expressing interest in raping, beating and murdering infants and toddlers.”

More from Wired:

As the acting cybersecurity chief of a federal agency, Timothy DeFoggi should have been well versed in the digital footprints users leave behind online when they visit web sites and download images.

 

But DeFoggi—convicted today in Nebraska on three child porn charges including conspiracy to solicit and distribute child porn—must have believed his use of the Tor anonymizing network shielded him from federal investigators.

 

But DeFoggi’s conviction is perhaps more surprising than others owing to the fact that he worked at one time as the acting cybersecurity director of the U.S. Department of Health and Human Services. DeFoggi worked for the department from 2008 until January this year. A department official told Business Insider that DeFoggi worked in the office of the assistant secretary for administration as lead IT specialist but a government budget document for the department from this year(.pdf) identifies a Tim DeFoggi as head of OS IT security operations, reporting to the department’s chief information security officer.

 

Although anyone could use the sites, registered users like DeFoggi—who was known online under the user names “fuckchrist” and “PTasseater”—could set up profile pages with an avatar, often child porn images, and personal information and upload files. The site archived more than 100 videos and more than 17,000 child porn and child erotica images, many of them depicting infants and toddlers being sexually abused by adults.

 

DeFoggi became part of that sting after becoming a registered member of PedoBook in March 2012 where he remained active until December that year when the FBI shuttered it. During this time DeFoggi, who described himself as “having many perversions,” solicited child porn images from other members, viewed images and exchanged private messages with other members expressing interest in raping, beating and murdering infants and toddlers.

 

DeFoggi received many commendations during his government career, according to an exhibit list created by the government for his trial. The list includes several certificates of award from the U.S. Treasury, a certificate of appreciation from the State Department for his work on a Hurricane Katrina task force, several documents related to computer courses he attended and certifications he received.

 

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
holdbuysell's picture

Sociopaths vs. Sociopaths.

Break out the popcorn.

BellyBrain's picture

The penalty for pedophilia and other forms of rape should be:  THE DEATH PENALTY.

Seriously.  End these sick fuckers, because there is no cure.

Further, the one who has been harmed (or their family) should be empowered and assisted in killing their abusers if they so desire. 

Finally, women should be well armed and well trained in all forms of interpersonal combat, and encouraged to kill attempted rapists.  Afterward such a killing occurs, the woman should be given counseling and a small token of gratitude from their community. 

Ballin D's picture

Or he didnt follow orders.

There are posts every day about the dangers of a government that supposedly tracks our every action online and what they can do with that blackmail. What prevents them from making stuff like this up?  I wouldnt trust their word against a stranger and just the same I wouldnt trust it against a brother.

FreedomGuy's picture

The thought struck me the other day that if NSA and others can monitor and get into all our communications and computers what prevents them from inserting whatever they want into the same devices? The vast majority of people are relatively unsophisticated in the nuances of their systems and where things could be hidden.

So incumbent Comrade A is running against challenger Comrade B for office and losing handily. Two weeks before election Comrade B is found to have 25,000 child porn, actual rape and snuff photos and videos on his computer. Comrade B is confronted by planted reporter and supporter of Comrade A during a live campaign rally and is speechless.

Comrade B loses handily and his name is cleared five years later. Meanwhile Comrade A smiles and tells all challengers to take notes. He also doubles the funding of the NSA.

Urban Roman's picture

Exactly.

Kiddie porn is such a convenient way to obtain a conviction and end someone's career. Nothing else is required; simply stick a few files on the victim's computer and call the police. No other evidence is needed.

Say What Again's picture

OT but - Has anyone else noticed how slow ZH is in responding?  Downloads are slow, login is slow, posting is slow.

What's going on?

So What's picture

The second most disturbing thing about this article is that Tor Browser is not as safe as claimed. they can still track you down. So rebels, use caution.

Pinto Currency's picture

 

 

Most of those control freaks are perverts.

InjectTheVenom's picture

No worries for this creep ... he should find a position in Barry's inner-circle within a year . He'd fit in perfectly ... they're always lookin' for fine morally-sound men like this !

Liberal's picture

As a staunch liberal, I just want to urge you all NOT to lose faith in our government. This is a totally isolated case. I am 100% certain he's the ONLY ONE bad apple out of all federal employees. Only one. There are no other bad apples. None. You can trust us.

Pinto Currency's picture

 

 

Not even a smidgeon of bad apples.

Liberal's picture

And I'm sure this DeFoggi guy is just misunderstood. Maybe he was just doing good ol' spy work and found some powerful people at the si...Oh, I better stop now.

Richard Chesler's picture

He should have no problem finding a job at the SEC or TSA.

Banana republics SOP.

 

jeff montanye's picture

re: death penalty

only as good as the criminal justice system enforcing it.

given all the people taken off death row by dna evidence, i'd be a little hesitant to enlarge the ability of the masters to execute the "citizenry", especially for computer crimes that, as noted, can be faked so easily.

http://www.law.berkeley.edu/cawrongfulconviction.htm

http://www.innocenceproject.org/Content/DNA_Exonerations_Nationwide.php

eclectic syncretist's picture

I predict we're going to trade in a whole bunch of our current sociopathic leaders for a new bumper crop of them this Fall.  Assholes.

Save_America1st's picture

as I've always said...these sick government fucks are all sociopaths...this particular sick fuck is also a full-on psychopath as well.

boattrash's picture

Help me out here. Does anybody remember if this was the guy recently arrested by Feds with much fanfare? Seems some perv w/no violent record was busted in Mid-West w/SWAT, Choppers, Etc.. with a local School being used as a staging area. (If I find it ,Ill come back with a link).

Nehweh Gahnin's picture

The death penalty is a lot more reliable if you kill the perpetrator while he is committing/attempting the crime.

Vullsain's picture

Yeah, amazing how many of these ZH, distrust of government types become goose stepping sheep when agitated.This article is very disturbing, but to advocate for execution of all convicted rapists, with the readily available knowledge of false accusations and convictions is classic lemming like behaviour. It might be different if the legal system strived for justice instead of politically and career motivated conviction rates. Or if financial or revenge motivated accusations were actually prosecuted. This will never happen as the Police State uses politically correct propaganda and hysteria tactics to further erode our constitutional rights. For the idiots who don't get it and bury their heads in the sand, google Brian Banks rape conviction.

MsCreant's picture

Trust gov?

Trust libs?

The performance of performance troll is incomplete without the details.

Liberal's picture

Are you racist or something?

Rakshas's picture

LOL - nice one  MsCreant, can't vote up can't vote down - wonder how many trollbots fell off thier stool on that one.....  now if they'd only understand the same exists for elephant/donkey...... 

zanez's picture

They'll make him head of the SEC.

 

OldPhart's picture

Hard to tell since he shaved off the mustache.

lakecity55's picture

Hint: "tor" was created by in ess ay.

PeakOil's picture

No. US Naval Research Lab, & DARPA. Currently maintained & developed by the Tor Project.(open source) There have been several attacks on Tor over the years. So what? This is clearly similar to the cryptographers and crypto-analysts "arms race" which has gone on forever. The ideas and motivation behind Tor are sound, but like anything else, there are limitations and cautions. No technology can be used blindly. 

The point is, to slam Tor and to just give up using good technologies like Tor and I2P and strong crypto because there are always cautions and things to be aware of is precisely what the 3-letter agencies want you to believe! Encryption works. If used properly, it gives the powers that be fits.

 

 

 

Lux Fiat's picture

I am no expert on Tor or web anonimity, but the moment I read that DARPA and other government agencies had a hand in it's development, I thought it might be a potential long-term honeypot.  Couldn't say whether it is or not, but would they really be involved in something like that and not create a backdoor somewhere?

PT's picture

Talk is cheap.  If you didn't write the code yourself then you can't trust it.  If you can't read the code then you can't trust it.  If you can't understand the code then you can't trust it.  In fact, these days I can't trust the hardware either and neither should you.  Most people understand if you say you can't trust a mechanic and yet they trust those who build and program their computers.  WTF is up with that????????????????

PT's picture

P.S.  And hackers are people who write and understand such things as "POKE 47298,24" or some modern language equivalent.
Downloading and running some file that someone else wrote, without so much as a glance at the underlying code, is NOT hacking, not even in the slightest.

Err, not sure if I started drifting off topic just there but I thought the point needed making anyways.

Lux Fiat's picture

I guess there are no guarantees in life, or code.  Caveat compiler? 

There have been a number of intriguing links that I have not clicked on over the years, whether on ZH or elsewhere, because of concerns over what might find it's way onto my computer, as anti-virus software etc. is not always all it is cracked up to be.  And from what I have read and heard over the years, backdoors seem to be the norm, regardless of who developed it. 

PeakOil's picture

So we should all just throw up our hands? Say: "it's too complicated" and give up? No. Be aware of the risks and fight back.

vegan's picture

Maybe? Maybe not?

I don't claim to have any knowledge whatsoever about this case, it's entirely possible that a rogue govt set the guy up on fictitious charges; none of us trust this govt any farther than we can shit. We know that peacful protesters are targeted as "terrorists", so is it a stretch to set up a "persona non grata" as a fan of child exploitation?

Anyway, it's also possible that the govt/prosecution threw in mention of TOR just to make people say "Oh, fuck it. It's too complicated and it doesn't even work." The govt has previously claimed that they can easily crack any encrption, so don't bother with encryption. I'm sure they read a lot of encrypted messages, but NOT because they cracked the encryption, rather they compromised the hardware and/or software being used to compose and read encrypted messages.

 

aurum4040's picture

Its simple - if you or we are all afraid of the illuminati - they are winning. If we all weren't afraid and expressed that through mass rebellion of the atrocities at hand - we win. 7.5 billion vs. the <1%'ers = the new world order that the masses need.

booboo's picture

"The second most disturbing thing about this article is that Tor Browser is not as safe as claimed"

That was the intended message the entire article was built around. See how easy that was.

sleigher's picture

Exactly.  If TOR is so compromised, then how come it took so long to get the dread pirate roberts dude (I forget his name).

PeakOil's picture

Eh, CIA funded? Doubt that. Man in the middle, traffic analysis, and browser exploits by the NSA - yes. Anything can be attacked. How easy and costly are these attacks to pull off? That is another question entirely. If the NSA wants to throw the full weight of the agency against you - then you likely have a problem and must be extremely careful online!! But if you are Joe Blow Tor user who just values his privacy and isn't frequenting dangerous potential honey-pot sites that host child-porn, then you are probably OK.

MontgomeryScott's picture

You're pushing 'TOR' WAY too hard.

It's almost as if you have some 'ulterior motive' here.

Straight from the horse's mouth:

http://www.ohmygodel.com/publications/usersrouted-ccs13.pdf

 

 

 

 

 

 

 

 

 

 

This is the report, and in full (if you care to open the link).

U.S.N.R.L. and Georgetown University, and TOR.

Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 1 U.S. Naval Research Laboratory, Washington DC {aaron.m.johnson, rob.g.jansen, paul.syverson}@nrl.navy.mil Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 2 Georgetown University, Washington DC {cwacek, msherr}@cs.georgetown.edu
SuperRay's picture

"I don't believe anything the government says"

George Carlin

MayIMommaDogFace2theBananaPatch's picture

"All governments are lying cocksuckers"

Bill Hicks

McMolotov's picture

Probably just the NSA quietly placing a bunch of kiddie porn on the ZH servers.

Ralph Spoilsport's picture

I'm not having any noticeable problem with my connection but I'm talking with my brother in Ohio and he is having trouble with slow page loads on ZH. He's with Comcast and I have a connection with AboveNet. It's a radio link on my end so this connection is only rated at 3 Mbps in clear weather with no large ships getting in the way.

jeff montanye's picture

currently zh working fine for me but some time ago it was extremely hard to keep stories up, had to keep the mouse clicked down on the blue oval to maintain control, had to make comments very quickly to avoid page blankouts, etc. etc. etc.  perservered nonetheless.

RichardParker's picture

Less work than going to the trouble to plant an ounce of coke in his car.  Besides, doing the time for possesion has got to be way easier than for pedophilia.

PT's picture

Ding ding ding.  We have a winner.

jeff montanye's picture

and the shame factor is so much more satisfying.

SMG's picture

Among the Elite pedophilia is a religious thing.  They believe the act is about stealing some of the power from the victim. That said, you could eliminate just about any enemy you want simply by placing offending pic/vids on your enemies computer.

Frightening.

What a world.  It needs to change for the better.

 

John_Coltrane's picture

This problem is completely eliminated by encrypting your entire internal HD using truecrypt or equivalent software.  Then store anything really valuable in removeable, hideable, also encrypted media if you're really paranoid.  Pretty hard to place images in unencrpted form or plaintext on an encrypted disc and then claim they belong to the computer owner, when everything else looks like binary gibberish (since its encrypted).  And if they demand you give up the passphrase to decrypte it they further destroy their case since everything decrypted is perfectly ordinary (maybe just the operating system and standard software).  Of course the hidden encypted media contains your real operating system, sensitive data etc.  And you boot only from removal media!  The computer internal HD is just a dummy system to entrap dummies (i.e. FBI, NSA types).